Emudhra CPS v2.1
Emudhra CPS v2.1
Emudhra CPS v2.1
VERSION 2.1
(eMCSL/e-Mudhra/DOC/CPS/2.1)
e-Mudhra
eMudhra Consumer Services Ltd.,
3rd Floor, Sai Arcade,
Outer Ring Road,
Devarabeesanahalli,
Bangalore - 560036
Karnataka, India
Phone: +91 80 43360000
Fax: +91 80 42275306
Email: info@e-mudhra.com
Website: www.e-mudhra.com
ii
NOTICE
Save as otherwise provided as per the laws of India, the services provided by e-Mudhra
shall, at any time, be in accordance with the applicable laws in India and shall be subject to
the jurisdiction of various courts, tribunals and authorities in India, including but not limited to
the Information Technology Act, 2000, its rules and regulations and any amendment thereto.
Any person who uses the digital signature certificate in an improper manner or violate the
provisions detailed under this e-Mudhra Certification Practice statement shall render
himself/herself liable for civil/criminal action and be proceeded against as per the provisions
of applicable civil/criminal laws and IT act or any other act/acts that are relevant and in force
from time to time. Attention is also drawn to the IT Act Chapter VIII wherein the duties of
subscribers are specified.
iii
DEFINITIONS
The following definitions are to be used while reading this CPS. The following terms shall
bear the meanings assigned to them hereunder and such definitions shall be applicable to
both the singular and plural forms of such terms:
Note: The contextual meaning of the terms may be considered for such terms that are used
in this CPS but not defined above.
iv
EXECUTIVE SUMMARY OF e-Mudhra CPS
eMudhra Consumer Services Limited’s (eMudhra CSL) core business goals are:
• To change the rule of the game of consumer servicing by providing either totally
unique services or existing services with material difference to the consumer;
• To enable consumers to manage their financial and statutory obligations and need
through technology enabled process and by changing the way they have been
transacting;
• To enable and empower consumer by aiding with secured technology that will help
them achieving their financial goals.
As the Indian consumer base is exponentially growing, to manage the volume, eMudhra CSL
is proposing to build appropriate technology engines which will provide for a non-linear
model to deliver the services needs of consumers. It has also been proposed that eMudhra
CSL will provide digital signature certificates to consumers so that they can transact over the
internet in a secured way. Digital Signature protected online transaction concept is
reasonably new and with Digital Signature Certificates the consumers will be very
comfortable in using the online for any of his financial transactions or e-commerce
transactions. Besides eMudhra CSL’s other services offerings such as Online Tax Filing
services, Electronic Payment services etc will enhance the value of the digital signature
certificate acquired by the consumer.
This Certification Practice Statement (CPS) describes the practices followed with regard to
the management of the lifecycle of the certificates issued by e-Mudhra CA
Except for notice by the applicant to the contrary, an applicant, applying for a Certificate
through e-Mudhra CA, understand and agree that, at all times during the acceptance and the
validity of the certificate, he shall be bound by this CPS and for any person who relies on the
information provided in the Certificate, for the following:
The subscriber undertakes that, by accepting the certificate issued by the e-Mudhra CA,
shall use it in a trustworthy system and he shall be solely responsible for his possession and
use of private key and shall take such measures necessary to prevent any unauthorized use,
access, tampering or loss of the private key. The user shall request for revocation at all
times where there has been evidence of theft, tampering, loss and compromise of the user’s
private key.
v
3. Liability
Without limiting subscriber’s obligations stated in this CPS, subscribers are liable for any
misrepresentation they make in the digital signature certificates and on which third parties
reasonably rely believing the same to be true.
Or contact,
info@e-mudhra.com
vi
LIST OF ACRONYMS AND ABBREVIATIONSUSED IN THIS CPS
Acronym Term
ARL Authority Revocation List
ASN.1 Abstract Syntax Notation.1
CA Certifying Authority
CCA Controller Of Certifying Authorities
CN Common Name
CP Certificate Policy
CPS Certification Practice Statement
CRL Certificate Revocation List
CSR Certificate Signing Request
DN Distinguished Name
HTTP Hypertext Transfer Protocol
HTTPS Hypertext Transfer Protocol With SSL
IETF Internet Engineering Task Force
ITU International Telecommunications Union
LDAP Lightweight Directory Access Protocol
LDIF LDAP Directory Interchange Format
NRDC National Repository Of Digital Signature Certificates
OID Object Identifier
PAC Policy Approval Committee
PIN Personal Identification Number
PKCS Public-Key Cryptography Standard
PKI Public Key Infrastructure
PUK PIN Unlock Key
RA Registration Authority
RCAI Root Certifying Authority Of India
RFC Request For Comment
S/MIME Secure Multipurpose Internet Mail Extensions
SSL Secure Sockets Layer
SUB-CA Subordinate Certifying Authority
URI Uniform Resource Indicator
URL Uniform Resource Locator
vii
TABLE OF CONTENTS
1. INTRODUCTION ................................................................................................................ 1
1.1 Services Offered.................................................................................................................. 1
1.1.1 Retail Trust Services ..................................................................................................... 1
1.1.2 Managed PKI Services .................................................................................................. 1
1.1.3 OCSP (Online Certificate Status Protocol) Validation Services .................................. 1
1.2 Certifying Authority............................................................................................................ 2
1.3 Registration Authority ........................................................................................................ 2
1.4 Components Of e-Mudhra Public Hierarchy ...................................................................... 2
1.5 Role Of CPS And Other Documents .................................................................................. 3
1.6 Relationship With Controller Of Certifying Authority....................................................... 3
1.7 Compliance With IT Act ..................................................................................................... 4
1.8 Policy Overview.................................................................................................................. 4
1.8.1 e-Mudhra Class 1 Individual ........................................................................................ 4
1.8.2 e-Mudhra Class 2 Individual ........................................................................................ 4
1.8.3 e-Mudhra Class 2 Organization ................................................................................... 4
1.8.4 e-Mudhra Class 3 Individual ........................................................................................ 5
1.8.5 e-Mudhra Class 3 Organization ................................................................................... 5
1.8.6 e-Mudhra Class 3 Device .............................................................................................. 5
1.8.7 Types of Certificates ..................................................................................................... 6
1.8.7.1 Signature Certificate .................................................................................................. 6
1.8.7.2 Encryption Certificate ................................................................................................ 6
1.8.7.3 SSL Client Certificate ................................................................................................ 6
1.8.7.4 SSL Server Certificate ............................................................................................... 6
1.8.7.5 Code Signing Certificate ............................................................................................ 7
1. 9 Identification ...................................................................................................................... 7
1.10 Community And Applicability ......................................................................................... 7
1.10.1 Certifying Authority and Hierarchy ............................................................................ 7
1.10.2 Registration Authorities .............................................................................................. 7
1.10.3 End Entities ................................................................................................................. 7
1.11 Community And Applicability ......................................................................................... 8
1.11.1 Prohibited Applications .............................................................................................. 8
1.12 Contact Details .................................................................................................................. 9
1.12.1 Specification Administration Organization ................................................................ 9
1.12.2 Contact person ............................................................................................................ 9
1.12.3 Person Determining CPS Suitability for the Policy .................................................... 9
2. GENERAL PROVISIONS ................................................................................................. 10
2.1 Obligations ........................................................................................................................ 10
2.1.1 CA Obligations ........................................................................................................... 10
2.1.2 RA obligations ............................................................................................................ 10
2.1.3 Subscriber Obligations ................................................................................................ 11
viii
2.1.4 Relying Party Obligations ........................................................................................... 11
2.1.5 Repository obligations ................................................................................................ 12
2.2 Liability ............................................................................................................................. 12
2.2.1 Certifying Authority Liability ..................................................................................... 12
2.2.1.1 Warranties to Subscribers and Relying Parties ........................................................ 12
2.2.1.2 Disclaimers of Warranties........................................................................................ 12
2.2.1.3 Limitations of liability ............................................................................................. 12
2.2.1.4 CA Liability Caps .................................................................................................... 13
2.2.1.5 Force Majeure .......................................................................................................... 13
2.2.2 RA Liability ................................................................................................................ 13
2.2.3 Subscriber Warranties and Private Key Compromise ................................................ 13
2.2.3.1 Subscriber Warranties .............................................................................................. 13
2.2.3.2 Private Key Compromise (PKC) ............................................................................. 13
2.2.4 Relying Party Liability................................................................................................ 14
2.3 Financial Responsibility.................................................................................................... 14
2.3.1 Indemnification by Subscribers .................................................................................. 14
2.3.2 Indemnification by relying parties .............................................................................. 14
2.3.3 Fiduciary Relationships .............................................................................................. 14
2.3.4 Administrative Processes ............................................................................................ 14
2.4 Interpretation And Enforcement ...................................................................................... 14
2.4.2 Severability, Survival, Merger, Notice ....................................................................... 15
2.4.3 Dispute Resolution Procedures ................................................................................... 15
2.4.3.1 Disputes among e-Mudhra and Customers .............................................................. 15
2.4.3.2 Disputes with End-User Subscribers or Relying Parties.......................................... 15
2.4.4 Role of the CCA.......................................................................................................... 15
2.5 Fees ................................................................................................................................... 15
2.6 Publication And Repository .............................................................................................. 16
2.6.1 Publication of CA Information ................................................................................... 16
2.6.2 Frequency of Publication ............................................................................................ 16
2.6.3 Access Control ............................................................................................................ 16
2.7 Compliance Audit ............................................................................................................. 17
2.7.1 Frequency of Audit ..................................................................................................... 17
2.7.2 Identity of Auditor ...................................................................................................... 17
2.7.3 Auditors relationship to audited party......................................................................... 17
2.7.4 Topics covered by Audit ............................................................................................. 17
2.7.5 Actions taken as result of deficiency .......................................................................... 17
2.7.6 Communication of results ........................................................................................... 17
2.8 Confidentiality And Privacy ............................................................................................. 17
2.8.1 Types of Information to be kept Confidential and Private ......................................... 17
2.8.2 Types of information not considered confidential or private...................................... 18
2.8.3 Disclosure of Certificate Revocation/Suspension Information................................... 18
2.8.4 Release to Law Enforcement Officials ....................................................................... 18
2.8.5 Release as Part of Civil Discovery.............................................................................. 18
2.8.6 Disclosure upon Owner’s Request .............................................................................. 18
ix
2.8.7 Other Information Release Circumstances ................................................................. 19
2.9 Intellectual Property Rights .............................................................................................. 19
2.9.1 Property Rights in Certificates and Revocation Information ...................................... 19
2.9.2 Property Rights in the CPS ......................................................................................... 19
2.9.3 Property Rights in Names ........................................................................................... 19
2.9.4 Property Rights in Keys and Key Material ................................................................. 19
3. IDENTIFICATION AND AUTHENTICATION: ............................................................. 20
3.1 Initial Registration ............................................................................................................ 20
3.1.1 Types of Names .......................................................................................................... 20
3.1.2 Need for names to be meaningful ............................................................................... 20
3.1.3 Rules for Interpreting Various Name Forms .............................................................. 21
3.1.4 Uniqueness of Names ................................................................................................. 21
3.1.5 Name Claim Dispute Resolution Procedure ............................................................... 21
3.1.6 Recognition, Authentication, and Role of Trademarks .............................................. 21
3.1.7 Method to prove possession of private key................................................................. 21
3.1.8 Authentication of Organization Identity ..................................................................... 21
3.1.9 Authentication of the Identity of RAs ......................................................................... 22
3.1.10 Authentication of Individual Identity........................................................................ 22
3.1.10.1 Class 1 Individual ................................................................................................. 22
3.1.10.2 Class 2 Individual ................................................................................................. 22
3.1.10.3 Class 2 Organization ............................................................................................. 23
3.1.10.4 Class 3 Individual ................................................................................................. 23
3.1.10.5 Class 3 Organization ............................................................................................. 23
3.1.10.6 Class 3 Device........................................................................................................ 23
3.1.10.7 Verification documents required............................................................................ 24
3.2 Rekey And Renewal Process ............................................................................................ 34
3.3 Rekey After Revocation .................................................................................................... 34
3.4 Revocation Request .......................................................................................................... 34
4. OPERATIONAL REQUIREMENTS ................................................................................. 35
4.1 Certificate Application ...................................................................................................... 35
4.1.1 Certificate Applications for End-User Subscriber Certificates ................................... 35
4.1.2 Certificate Application for Sub CA and RA Certificates............................................ 35
4.2 Certificate Issuance ........................................................................................................... 35
4.2.1 Issuance of End-User Subscriber Certificates............................................................. 35
4.2.2 Issuance of Sub CA, RA and Managed PKI Certificates............................................ 36
4.3 Certificate Acceptance ...................................................................................................... 36
4.4 Certificate Suspension And Revocation ........................................................................... 36
4.4.1 Circumstances for Revocation .................................................................................... 36
4.4.1.1 Circumstances for Revocation of Subscriber Certificate ......................................... 36
4.4.1.2 Circumstances for Revocation of Sub-CA or RA Certificates ................................ 37
4.4.2 Who Can Request Revocation .................................................................................... 37
4.4.2.1 Who Can Request Revocation of Subscriber Certificate ......................................... 37
4.4.2.2 Who Can Request Revocation of a Sub-CA or RA Certificate ............................... 37
4.4.3 Procedure for Revocation Request.............................................................................. 38
x
4.4.3.1 Procedure for Revocation Request of Subscriber Certificate .................................. 38
4.4.3.2 Procedure for Revocation Request of a Sub-CA or RA Certificate......................... 38
4.4.4 Revocation Request Grace Period .............................................................................. 38
4.4.5 Circumstances for Suspension .................................................................................... 38
4.4.6 Who can Request Suspension ..................................................................................... 38
4.4.7 Procedure For Suspension Request ............................................................................. 38
4.4.8 Limits On Suspension Period...................................................................................... 38
4.4.9 CRL Issuance Frequency ............................................................................................ 38
4.4.10 Certificate Revocation List Checking Requirements ................................................ 38
4.4.11 On-Line Revocation/Status Checking Availability .................................................. 39
4.4.12 On-Line Revocation Checking Requirements .......................................................... 39
4.4.13 Other Forms of Revocation Advertisements Available ............................................ 39
4.4.14 Special Requirements Regarding Key Compromise................................................. 39
4.5 Security Audit Procedures ................................................................................................ 39
4.5.1 Types of Events Recorded .......................................................................................... 39
4.5.2 Frequency of Processing Log...................................................................................... 40
4.5.3 Retention Period for Audit Log .................................................................................. 40
4.5.4 Protection of Audit Log .............................................................................................. 40
4.5.5 Audit Log Backup Procedures .................................................................................... 40
4.5.6 Audit Collection System ............................................................................................. 40
4.5.7 Notification to Event-Causing Subject ....................................................................... 40
4.5.8 Vulnerability Assessments .......................................................................................... 40
4.6 Records Archival .............................................................................................................. 40
4.6.1 Types of Events Recorded .......................................................................................... 40
4.6.2 Retention Period for Archive ...................................................................................... 41
4.6.3 Protection of Archive .................................................................................................. 41
4.6.4 Archive Backup Procedures ........................................................................................ 41
4.6.5 Requirements for Time-Stamping Of Records ........................................................... 41
4.6.6 Archive Collection System ......................................................................................... 41
4.6.7 Procedures to Obtain and Verify Archive Information............................................... 41
4.7 Key Changeover................................................................................................................ 41
4.8 Disaster Recovery And Key Compromise ........................................................................ 41
4.9 CA Termination ................................................................................................................ 42
4.10 Cross Certification .......................................................................................................... 42
5.1 Physical Controls .............................................................................................................. 43
5.1.1 Site Location and Construction ................................................................................... 43
5.1.2. Physical Access .......................................................................................................... 43
5.1.3. Power and Air Conditioning ...................................................................................... 43
5.1.4. Water Exposures ........................................................................................................ 43
5.1.5 Fire Prevention and Protection.................................................................................... 43
5.1.6 Media Storage ............................................................................................................. 43
5.1.7. Waste Disposal........................................................................................................... 44
5.1.8. Off-Site Backup ......................................................................................................... 44
5.2 Procedural Controls .......................................................................................................... 44
xi
5.2.1 Trusted Roles .............................................................................................................. 44
5.2.2 Number of Persons Required Per Task ....................................................................... 44
5.2.3 Identification and Authentication for Each Role ........................................................ 44
5.3 Personnel Controls ............................................................................................................ 45
5.3.1 Background, Qualifications, Experience, and Clearance Requirements .................... 45
5.3.2 Background Check Procedures ................................................................................... 45
5.3.3 Training Requirements................................................................................................ 45
5.3.4 Retraining Frequency and Requirements .................................................................... 45
5.3.5 Job Rotation Frequency and Sequence ....................................................................... 45
5.3.6 Sanctions for Unauthorized Actions ........................................................................... 45
5.3.7 Contracting Personnel Requirements .......................................................................... 46
5.3.8 Documentation Supplied to Personnel ........................................................................ 46
6.1 Key Pair Generation And Installation ............................................................................... 47
6.1.1 Private Key Delivery to Entity.................................................................................... 47
6.1.2 Public Key Delivery to Certificate Issuer ................................................................... 47
6.1.3 CA Public Key Delivery to Users ............................................................................... 47
6.1.4 Key Sizes .................................................................................................................... 47
6.1.5 Public Key Parameters Generation ............................................................................. 47
6.1.6 Parameter Quality Checking ....................................................................................... 47
6.1.7 Hardware/Software Key Generation ........................................................................... 48
6.1.8 Key Usage Purposes ................................................................................................... 48
6.2 Private Key Protection ...................................................................................................... 48
6.2.1 Standards for Cryptographic Modules ........................................................................ 48
6.2.2 Private Key (N out of M) Multi-Person Control ......................................................... 48
6.2.3 Private Key Escrow..................................................................................................... 48
6.2.4 Private Key Backup .................................................................................................... 48
6.2.5 Private Key Archival................................................................................................... 48
6.2.6 Private Key Entry into Cryptographic Module ........................................................... 49
6.2.7 Method of Activating Private Key .............................................................................. 49
6.2.8 Method of Deactivating Private Key .......................................................................... 49
6.2.9 Method of Destroying Private Key ............................................................................. 49
6.3 Other Aspects Of Key Pair Management.......................................................................... 49
6.3.1. Public Key Archival ................................................................................................... 49
6.3.2. Usage Periods for the Public and Private Keys ......................................................... 50
6.4 Activation Data ................................................................................................................. 50
6.4.1. Activation Data Generation and Installation.............................................................. 50
6.4.2. Activation Data Protection ......................................................................................... 50
6.5 Computer Security Controls ............................................................................................. 50
6.5.1 Specific Computer Security Technical Requirements ................................................ 50
6.5.2 Computer security rating............................................................................................. 50
6.6 Life Cycle Technical Controls ........................................................................................ 50
6.6.1 System Development Controls ................................................................................... 50
6.6.2 Security Management Controls................................................................................. 50
6.6.3 Life Cycle Security Ratings ........................................................................................ 51
xii
6.7 Network Security Controls ............................................................................................... 51
6.8 Cryptographic Module Engineering Controls ................................................................... 51
7. CERTIFICATE AND CRL PROFILE ............................................................................... 52
7.1 Certificate Profile .............................................................................................................. 52
7.1.1 Version Number(s) Supported .................................................................................... 52
7.1.2 Certificate Extensions ................................................................................................. 53
7.1.3 Algorithm Object Identifiers ....................................................................................... 53
7.1.4 Name Forms ................................................................................................................ 53
7.1.5 Name Constraints ........................................................................................................ 53
7.1.6. Certificate Policy Object Identifier ............................................................................ 53
7.1.7 Usage of Policy Constraints Extension ....................................................................... 53
7.1.8. Policy Qualifiers Syntax and Semantics .................................................................... 53
7.1.9 Processing Semantics for the Critical Certificate Policy Extension ........................... 53
7.2 CRL Profile ....................................................................................................................... 54
7.2.1. Version Number(s) Supported ................................................................................... 54
7.2.2 CRL AND CRL Entry Extensions .............................................................................. 54
8. SPECIFICATION ADMINISTRATION ........................................................................... 55
8.1 Specification Change Procedures ..................................................................................... 55
8.1.1. Items that Can Change Without Notification............................................................. 55
8.1.2. Items that Can Change with Notification................................................................... 55
8.1.2.1 List of Items ............................................................................................................. 55
8.1.2.2 Notification Mechanism........................................................................................... 55
8.2 Publication And Notification Procedures ......................................................................... 55
8.2.1 Items not published in the CPS ................................................................................... 55
8.2.2 Distribution of the CPS ............................................................................................... 55
8.3 CPS Approval Procedures................................................................................................. 56
9. GLOSSARY ....................................................................................................................... 57
9.1 Definitions......................................................................................................................... 57
xiii
INTENTIONALLY LEFT BLANK
1. INTRODUCTION
This Certification Practice Statement details the practices that e-Mudhra adopts to provide
Digital Signature Certificates and related services. The CPS is the principal practice
statement governing the services provided by e-Mudhra and establishes conformance to the
requirements of the Indian Information Technology Act,2000 (IT Act). All transactions
facilitated by electronic means viz., electronic data interchange and electronic means of
communication, falling under the umbrella of “electronic commerce”, are granted legal
recognition under the Information Technology Act.
e-Mudhra Managed PKI solution would provide enterprises with a cost-efficient solution to a
PKI system that can be adapted to the enterprises requirements without having to operate a
Certification Authority set-up. The enterprises can outsource to e-Mudhra the issuance of
digital signature certificates and other administrative tasks such as digital signature
certificate generation, validation, renewal and revocation of certificates issued to their
customers, employees and partners.
1
1.2 Certifying Authority
The term “Certifying Authority” or CA as used in this CPS, represents e-Mudhra as the entity,
licensed by the Controller of Certifying Authorities (CCA), Govt. of India
e-Mudhra may issue several “classes” of certificates depending on the level of ‘trust’
requirements. It is to be noted that:
• e-Mudhra CA certificate will be signed by CCA. e-Mudhra CA in turn will create and
sign the public keys of various class level sub-CAs representing each class of digital
signature certificate. e-Mudhra CA may also create and sign end user subscriber
certificates for specific classes of certificate.
• The responsibilities related to the certificate issued under any class of e-Mudhra
hierarchy rests with e-Mudhra.
In carrying out this responsibility e-Mudhra may enter in to contractual agreements with
external parties like RAs, Managed PKI customers, partners etc.
The subscriber can choose any one of the classes based on his requirements. For Managed
PKI services or for any future purposes, if need be, e-Mudhra would offer an arrangement
whereby some more specific Sub-CAs are created for representing various class of
certificates.
Notes:
1. e-Mudhra may choose to have only a subset of the hierarchy and services mentioned
based on commercial and operational considerations. The service and offerings
mentioned above could be changed in the subsequent versions of the CPS.
2. e-Mudhra reserves the sole right to accept applications for its certificates and issue
digital signature certificates. The validation and verification procedures for each class
of certificates will be as mentioned in this CPS and in accordance with the IT Act.
2
1.5 Role Of CPS And Other Documents
This CPS explains specific practices of e-Mudhra with respect to issuance and management
of the certificates. It covers the following areas:
• Appropriate application for various classes of certificates.
• Assurance level associated with each class.
• Obligation of e-Mudhra CA, Registration Authority (RA), Subscriber and Relying
parties.
• Legal matters that are covered in subscriber agreements and relying party
agreements.
• Audit and related security and practices reviews undertaken by company.
• Methods used for identification and verification of subscriber for various certificates.
• Operational procedures for certificate applications, issuance, acceptance, revocation,
and renewal.
• Physical, personnel, cryptographic private key and logical security.
• Operational security procedures for audit logging, records retention and disaster
recovery.
• Certificate and certificate revocation list (CRL) content
• Administration of CPS, including methods of updating it.
Security and operational policy and procedure documents and manuals are some of the
other documents that in addition to the CPS define the practices and processes of e-Mudhra
CA operations.
• Technical Specifications of CA System: The principles which define e-Mudhra PKI
security requirements and standards followed.
• IT Security Policy: Defines the guidelines covering the security implementation
across various areas such as Physical, Key Operations, People etc. and also the
audit requirements.
• Operating Procedure Manuals: Sets the operations guidelines governing the PKI
operations.
• Key Ceremony Guide: Key Management Operations guidelines policy and manuals
gives the detail procedure for carrying out various activities.
• Agreement documents including the Subscriber and the RA agreements are the legal
agreements that bind the various participants such as users, RAs to e-Mudhra
standards.
e-Mudhra may rely on the ancillary documents as may be required in addition to the CPS for
referring to any specific detailed standards.
3
1.7 Compliance With IT Act
e-Mudhra CA complies with Indian IT Act , Rules and Regulations. e-Mudhra CA practices
described in the CPS are designed to comply with the prevalent and applicable provisions
under the Act. As required by IT Act 2000, this CPS conforms the adherence to framework
provided in ITU RFC 1422 (X.509 version 3 certificates) in order to make interoperation
easier for person who is intending to use e-Mudhra services.
Assurance level - For Class 1 Individual certificates, the verification of the certificate
request represent a simple check of the certainty of the subject name within the repository,
plus a verification of the e-mail address.
4
1.8.4 e-Mudhra Class 3 Individual
Customers - Class 3 Individual certificates are issued to individuals.
Validation - The validation process is carried out as per section 3.1.10 of this CPS.
Class 3 Individual certificates are appropriate for digital signatures and encryption requiring a
high assurance about the subscriber’s identity.
Assurance level: Class 3 Individual certificate issuance processes make use of various
procedures to obtain strong confirmation of the identity of individual applicants such as
physical presence. These validation procedures provide stronger guarantee of an applicant’s
identity. Utilizing validation procedure by the RAs boosts the practical uses and
trustworthiness of Class 3 Individual certificates.
Assurance level: Class 3 Organization certificate issuance processes make use of various
procedures to obtain strong confirmation of the identity of individual applicants such as
physical presence. These validation procedures provide stronger guarantee of an applicant’s
identity. Utilizing validation procedure by the Registration Authorities boosts the practical
uses and trustworthiness of Class 3 certificates.
5
Assurance level: Class 3 Device certificate issuance processes make use of various
procedures to obtain strong confirmation of the identity of the server.
6
users to authenticate the server, check the validity of web content, and establish a secure
connection. The issuance process will be as referred in Section 3.1.10.6.
1. 9 Identification
This CPS is called e-Mudhra Certification Practice Statement. e-Mudhra manages the life-
cycle of digital signature certificates under e-Mudhra, and the contact details are mentioned
in section 1.12.1 of this CPS.
The Managed PKI Customers (enterprises) would act as Registration Authority for their
affiliated entities.
Applicants - An applicant is a person, entity, or organization that has applied for, but has
not yet been issued ae-Mudhra Digital signature certificate.
7
Subscribers - A Subscriber is a person, entity, or organization that has been issued ae-
Mudhra Digital Signature Certificate.
Relying parties – A Relying Party is a person, entity, or organization that relies on or uses
e-Mudhra Digital signature certificates and/or any other information provided in e-Mudhra
repository to verify the identity and public key of a subscriber and/or use such public key to
send or receive encrypted communications to or from a subscriber.
n addition specific categories or types of certificates are to be used only for the designated
purposes such as e-Mudhra CA certificates are to be used only for CA function, end
subscriber certificates cannot be used for CA function.
More generally, certificates shall be used only to the extent use is consistent with all
applicable laws, rules and regulations and in particular shall be used only to the extent
permitted by applicable export or import laws.
Also, with respect to X.509 Version 3 Certificates, the key usage extension is intended to
limit the technical purposes for which a private key corresponding to the public key in a
certificate may be used.
8
1.12 Contact Details
e-Mudhra,
eMudhra Consumer Services Ltd.,
3rd Floor, Sai Arcade,
Outer Ring Road,
Devarabeesanahalli,
Bangalore - 560036
Karnataka, India
Phone: +91 80 43360000
Fax: +91 80 42275306
Email: info@e-mudhra.com
Website: www.e-mudhra.com
9
2. GENERAL PROVISIONS
The responsibilities of various parties, participating in the e-Mudhra PKI as established by
this CPS has been defined in this section. The obligations of various parties have been
detailed.
2.1 Obligations
2.1.1 CA Obligations
The CPS specifies obligations for e-Mudhra CA throughout this document.
In addition e-Mudhra will make reasonable efforts to bind the subscriber and relying party
through the Subscriber Agreements and the Relying Party Agreement. Subscriber (whether
direct or Managed PKI) will not be enrolled or issued a certificate without consent/
agreement to the Subscriber Agreement. Similarly the relying party will be asked to consent
to the Relying Party Agreement before being able to validate the certificates.
2.1.2 RA obligations
RAs assist CA by performing validation functions, approving or rejecting Certificate
Applications, requesting revocation of Certificates, and approving renewal requests.
• Implement the practices described in this CPS.
• Verifying the applications and validating the supporting/relevant documents as
provided by the applicant and if necessary entering of relevant details online to e-
Mudhra.
• Before forwarding the digitally signed approval for issuance of certificate by e-
Mudhra, RA shall check for any known infringement by the applicant for Trademark,
10
• Authenticate requests from subscribers for revocation of certificates and send timely
revocation requests to e-Mudhra.
• Request of Revocation from other subscriber is to be forwarded to e-Mudhra for
timely revocation. RA to ensure the authenticity of such requests.
• Collect the relevant documents for the corresponding class of certificates from
applicant as mentioned in this CPS.
• Store the subscriber applications as required and defined in the IT Act 2000 and
subsequent amendments.
11
2.1.5 Repository obligations
e-Mudhra is responsible for the repository functions for all e-Mudhra CAs in its PKI
hierarchy. All certificates issued by e-Mudhra shall be published in its repository and updated
on a regular basis. The updated CRLs shall be published in the e-MudhraRepository once in
every week on Friday, however if there is any revocation of DSC in between then it will be
published immediately in the corresponding CRL. Thus the CRL will contain updates based
on revocations done.
2.2 Liability
All warranties and any disclaimers thereof, and any limitations of liability among e-Mudhra,
its Intermediaries ( RAs/partners) and their respective customers shall be in strict adherence
to the terms and conditions of the Agreement amongst them.
Similarly e-Mudhra’s Relying Party Agreements contain a warranty to relying parties that:
• Information in or incorporated by reference in Digital Signature Certificate, except
non verified subscriber Information, is accurate as provided by the subscriber
• The requirements of this CPS will be complied with while issuing the certificate by e-
Mudhra
12
e-Mudhra CA shall not be liable for any indirect, exemplary, special, punitive, incidental, and
consequential losses, damages, claims, liabilities, charges, costs, expenses or injuries
(including without limitation loss of use, data, revenue, profits, business and for any claims of
Subscribers or Users or other third parties including Relying parties).
e-Mudhra CA shall not be liable for any delay, default, failure, breach of its obligations under
the Subscribers Agreement, Relying Party Agreement and Registration Authority Agreement
2.2.2 RA Liability
The obligations and the liabilities of the RA including its warranties towards CA while
assisting the CA in issuing certificates to the subscribers are more particularly set out in
the Registration Authority Agreement signed between the parties
13
2.2.4 Relying Party Liability
All relying parties, who rely on the information provided in the Digital Signatures, under any
Agreement, are required to make an informed decision based on the sufficiency of the
information before them and e-Mudhra shall not guarantee or be liable for any decision
taken by a relying Party.
14
2.4.1 Governing Law
This CPS is governed by the IT Act 2000and all rules, regulations, amendments and any
guidelines issued by the appropriate authority to it from time to time.
2.5 Fees
The fees for various types of Digital signature certificates will be available on the company’s
website at www.e-mudhra.com and will be updated from time to time.
e-Mudhra is entitled to charge subscribers fees for management and issuance of certificates.
The current fees for various types of certificates are listed in the website.
e-Mudhra is not currently charging any fees to relying parties or other public for accessing
the certificate information from the repository. The certificate search facility is provided free
of cost at its website (www.e-Mudhra.com/repository/certs).
15
e-Mudhra shall update and make available the CRL, free of charge for access by relying
parties (www.e-mudhra.com/repository/crl). However any OCSP validation services as well
as provision of OCSP services to cater Managed PKI customers or others would be charged
based on the specific agreement between the parties.
e-Mudhra will be providing access to policy information documents such as CPS free of
charge (www.e-mudhra.com/repository/cps). This is however limited to the specific purpose
of viewing. Any reproduction, derivative work creation, modification etc, would be subject to
license agreement with e-Mudhra.
The refund policy and other payments terms would be governed as per the terms in the
subscriber agreement. In case the application is rejected the full amount would be refunded
to the subscriber.
The above terms and fee structure are subject to change at the sole discretion of e-Mudhra.
e-Mudhra shall reserve rights to not to publish any information that e-Mudhra considers as
confidential or not to be disclosed due to the sensitivity of the information.
2.6.4 Repositories
The e-Mudhra online repositories are available at www.e-mudhra.com.
16
2.7 Compliance Audit
As per the specifications of the IT Act 2000 and its associated rules, regulations and
amendments e-Mudhra would be getting compliance audits done. This would be performed
by one of the CCA empanelled set of auditors.
In addition to this Managed PKI customer will also undergo a compliance audit to the extent
required by IT Act. Apart from this other entities such as RA would also be asked to undergo
compliance audit to the extent required by IT Act by a CCA empanelled auditor selected by
e-Mudhra.
17
to registration and verification of the Digital Signature Certificate irrespective of
whether such information is provided in the Digital Signature Certificate or otherwise.
• Transactional records (both full records and the audit trail of transactions).
• Access to the audit reports and any information that is considered sensitive, shall be
provided exclusively to the e-Mudhra authorized trusted personnel and the CCA.
The purposes for which such information will be used shall be in accordance with the
provisions of applicable laws for the time being in force..
• Audit trail records created and or retained by e-Mudhra or a Customer.
• Contingency planning and disaster recovery plans.
• Security measures controlling the operations of e-Mudhra hardware and software
and the administration of Certificate services and designated enrolment services.
• Any other records / data / information mandated to be kept confidential and private by
the IT Act 2000, its associated rules and regulations.
18
confidential information is requested by the owner and the same shall be revealed to him
upon such owner establishing the proof of his identity to e-Mudhra or when the confidential
information are to be disclosed in response to any Legal / regulatory requirement.e-Mudhra
shall not be liable for any disclosure made as per the terms above and the owner shall
indemnify e-Mudhra on all situations for all losses, costs or damages incurred by e-Mudhra
arising in connection with or incidental to such disclosure.
19
3. IDENTIFICATION AND AUTHENTICATION:
20
The organization name (O) attribute type, when present in the subject distinguished name,
represents the legal name of the Subscriber organization. Such information provided is for
identity purposes only and shall not be construed to constitute any power of attorney or other
rights.
The purpose of the Distinguished Name is to uniquely identify the subscriber in public
repository in which it is published. In addition to the above, e-Mudhra Digital Signature
certificate shall also have a unique serial number which enables identification, suspension,
activation and revocation of the certificates issued.
21
• Company Registration
• Society Registration
• Memorandum of Understanding
• Article of Association
• Documents pertaining to Shops & Establishments Act
• Bank details for a Current Account
• Partnership Deed / Agreement etc
• Any other documents as specified in the CPS.
All necessary proof that the person is duly authorized to obtain certificate on behalf the
organization shall also be provided.
In addition for the Managed PKI Customers, e-Mudhra will ensure the existence of the
Managed PKI customers as outlined above. For device certificates, in addition the customers
will have to submit proof on existence of the servers/ devices and also proof that the
organization has authorized the issuance of a secure ID to the devices.
22
3.1.10.3 Class 2 Organization
For identifying organizations, details like registration details, Income Tax records/ Annual
reports / bank details will be required. The RA will verify the identity of the personnel
representing the Organization or Government Organization with the identification document
(attested / certified photocopies) as listed in section 3.1.10.7 of this CPS. Identification
documents must be government issued identification.
E-mail/Mobile validation, identification and authentication of the individual applicant will be
done by checking and verifying that the e-mail/Mobile address of the applicant does in fact
exist and the applicant is able to access the information sent through e-mail/Mobile.
The organization is verified against the documents like Income Tax records/ Annual reports /
bank details submitted by the organization.
RA will verify the identity of the personnel representing the Organization or Government
Organization applicant with the identification document (attested / certified photocopies).
Identification document must be government issued identification.
The organization is verified against the documents like Income Tax records/ Annual reports /
bank details submitted by the organization.
The applicant organization is verified by the documentary proof submitted as per Class 3
organization document requirements mentioned in section 3.1.10.7 of this CPS.
23
Applicant / authority is contacted vide any of the mediums like phone, mobile, email, SMS,
postal mail to validate the ssl certificate request, company, authorized personnel.
Additional identification in the form of Authorization letter from the company, authorizing the
individual to obtain a certificate will be required, where, the certificate is intended to be used
for Web form signing, User authentication, Code signing, VPN client purposes or for
securing servers and VPN devices.
Similarly for Class III certificates for VPN devices, the proof of ownership of the VPN device
shall be obtained from the certificate applicant.
1. Copy of Passport
2. Copy of Driving License.
3. Copy of PAN Card.
4. Copy Post Office ID Card.
5. Copy of Bank Account Passbook
containing the photograph and signed
by an individual with attestation by the
concerned Bank official.
6. Copy Photo ID Card issued by the
Ministry of Home Affairs of Centre/State
Governments.
7. Copy of Any Government issued photo
ID Card bearing the signatures of the
individual.
24
Municipal Corporation Receipt.
1. Copy of Passport
2. Copy of Driving License.
3. Copy of PAN Card.
4. Copy Post Office ID Card.
5. Copy of Bank Account Passbook
containing the photograph and
signed by an individual with
attestation by the concerned Bank
official.
6. Copy Photo ID Card issued by the
Ministry of Home Affairs of
Centre/State Governments.
7. Copy of Any Government issued
photo ID Card bearing the signatures
of the individual.
25
(Attested / Certified)
26
certificate applicant from
the applicant organization (as per the format
attached withthe application
form)
• Certificate of Incorporation
• Memorandum and Articles of
Association
• Registered Partnership Deed
• Valid business license document
e. Certified true copy of any one:
• Annual Report
• Income Tax Return
• Statement of Income
• Bank details of the organization
1. Copy of Passport
2. Copy of Driving License.
3. Copy of PAN Card.
4. Copy Post Office ID Card.
5. Copy of Bank Account Passbook
containing the photograph and
signed by an individual with
attestation by the concerned
Bank official.
6. Copy Photo ID Card issued by
the Ministry of Home Affairs of
Centre/State Governments.
7. Copy of Any Government issued
photo ID Card bearing the
signatures of the individual.
27
2. Copy of Electricity Bill.
3. Copy of Water Bill.
4. Copy of Gas connection.
5. Copy of Bank Statements signed
by the bank.
6. Copy of Service Tax/VAT
Tax/Sales Tax registration
certificate.
7. Copy of Driving License/RC
8. Copy of Voter ID Card
9. Copy of Passport.
10. Copy of Property Tax/
Corporation/ Municipal
Corporation Receipt.
28
requirement
1. Copy of Passport
2. Copy of Driving License.
3. Copy of PAN Card.
4. Copy Post Office ID Card.
5. Copy of Bank Account Passbook
containing the photograph and
signed by an individual with
attestation by the concerned Bank
official.
6. Copy Photo ID Card issued by the
Ministry of Home Affairs of
Centre/State Governments.
7. Copy of Any Government issued
photo ID Card bearing the signatures
of the individual.
29
proof: This may be considered.
However, if the address in the Photo-
id is different from the Address given
in the application then a separate
Address proof may be insisted &
collected.
30
on an in-person antecedent may suffice as
meeting the in-person identity proofing
requirement
1. Copy of Passport
2. Copy of Driving License.
3. Copy of PAN Card.
4. Copy Post Office ID Card.
5. Copy of Bank Account Passbook
containing the photograph and
signed by an individual with
attestation by the concerned Bank
official.
6. Copy Photo ID Card issued by the
Ministry of Home Affairs of
Centre/State Governments.
7. Copy of Any Government issued
photo ID Card bearing the signatures
of the individual.
31
2. Using single document copy to be
used for both Identity & Address
proof: This may be considered.
However, if the address in the Photo-
id is different from the Address given
in the application then a separate
Address proof may be insisted &
collected.
1. Copy of Passport
2. Copy of Driving License.
3. Copy of PAN Card.
4. Copy Post Office ID Card.
5. Copy of Bank Account Passbook
32
containing the photograph and
signed by an individual with
attestation by the concerned Bank
official.
6. Copy Photo ID Card issued by the
Ministry of Home Affairs of
Centre/State Governments.
7. Copy of Any Government issued
photo ID Card bearing the signatures
of the individual.
33
person of the RA and should bear the
name and address of the signatory.
2. Any subscriber who wishes to resubscribe to use the Digital Signature Certificate
issued by e-Mudhra, has to complete the registration process, afresh as outlined in
this CPS.
34
e-Mudhra RA and the Managed PKI clients shall have the right to authenticate for revocation
of any Subscriber certificate whose applications are authenticated by them, using their
access control rights given to them through their certificate.
e-Mudhra may revoke the certificates based on the online request without digital signature
from the subscriber login that is made available for the subscriber.
4. OPERATIONAL REQUIREMENTS
35
When a Managed PKI Customer approves a certificate application and communicates the
approval to e-Mudhra, certificate is issued to the certificate applicant. The procedures of this
section is used for a request to replace including renewal or rekey of a certificate
application.
36
• In case of organizational certificates, the subscriber’s organization name or
constitution changes or the relationship between the organization and the
representative to whom the certificate was issued has ceased to exist and / or;
• The subscriber has breached materially an obligation or representation or warranty
as per the Subscriber Agreement of e-Mudhra, in force at that time , and / or;
• The subscriber/e-Mudhra prefers to disagree on one or some or all the points of
Subscriber Agreement with the subscriber, and expresses his/its intention to
terminate the Subscriber Agreement and / or;
• The subscriber requests revocation of the certificate and / or;
• To comply with any judicial/ law enforcement proceedings.
37
4.4.3 Procedure for Revocation Request
The request will be online through a challenge phrase or in an offline mode through signed
revocation request. On receipt of a valid revocation request,e-Mudhra on a best effort basis,
will immediately revoke the certificate and notify the subscriber about the certificate
revocation. For offline revocation requests, the requests will be processed on the next
working day. The updation and publishing the CRL will be done as detailed in this CPS.
e-Mudhra shall place a mechanism wherein expired certificates are removed from the CRL’s
in 30 days after the certificate’s expiry date.
38
The CRLs will be available in e-Mudhra’s repository www.e-mudhra.com/repository/crl.
CA Life cycle management events, including key generation, storage, archival, backup,
recovery, and destruction of
• CA key
• Cryptographic devices
39
Log entries should include the following parameters:
• Date and time of the event
• Identity of the entity causing the event
The processing of audit logs includes a review of the audit logs and recording of significant
events in an audit log summary. e-Mudhra personnel shall verify that the log has not been
tampered with, conduct brief inspection all log entries, and investigate thoroughly in case of
any irregularities in the logs. Actions taken based on audit log reviews will be documented.
40
• Those material facts, apart from information required for audit compliance, that may
be foreseen
• Records are kept in the form of either digital -based messages or paper-based
documents. It is ensured that the indexing, storage, preservation, and reproduction of
records are accurate and complete.
On or before expiry of an existing certificate, the subscribers shall generate a new key pair
and submit the public key along with the new application for issuance of a new Certificate.
41
In the event of e-Mudhra key compromise, the key management and operations personnel of
e-Mudhra including the security, cryptographic operations, administration and management
representatives will act as per the incident management and disaster recovery plan which
has been approved by e-Mudhra Policy approval committee.
4.9 CA Termination
e-Mudhra reserves the right to terminate any Sub CA at its policy based discretion. In case
of termination of a Sub-CA (including Managed PKI), or e-Mudhra CA, e-Mudhra will create
and publish a termination plan that reasonably minimizes disruption to customers,
subscribers, and relying parties. The termination plan covers issues including but not limited
to:
• Providing notice to subscribers, relying Parties with which e-Mudhra has established
contacts, customers, and the CCA who may be affected by such a termination.
• Following duly, the maintenance protocols of the archives, as provided under this
CPS and the Act.
• Providing Customer services, revocation service & publishing of CRLs.
• Compensation for any certificates revoked under the termination plan(if found
necessary) or assisting issuance of new certificate in lieu of the revoked certificate
from another CA. In any case, such compensation shall not exceed the amount paid
to e-Mudhra CA by the certificate holder in respect of the subject certificate.
• The procedure / process of destructing private keys of the CA and/or the Sub CA.
• Provisions needed for the transition of services to a successor Sub-CA.
42
5. PHYSICAL, PROCEDURAL, AND PERSONNEL SECURITY CONTROLS
e-Mudhra primary site consists of seven physical tiers with security and physical controls in
accordance with IT Act.
43
5.1.7. Waste Disposal
Paper documents and materials as found unusable shall be disposed. e-Mudhra shall
dispose various materials using appropriate equipment or mechanism or as per
manufacturer’s guidelines. e-Mudhra has policies and procedures in place to dispose media
based on sensitivity of information in the media to be destroyed.
The details of trusted personnel is provided under Trusted Personnel List document
44
5.3 Personnel Controls
45
5.3.7 Contracting Personnel Requirements
Independent contractors and consultants are permitted access to e-Mudhra secure facilities
only to the extent they are escorted and directly supervised by trusted persons.
Relevant documents required to perform the roles are provided to personnel. Such relevancy
will be determined by e-Mudhra based on the role performed by the personnel.
e-Mudhra shall make available to the personnel the Digital Signature Certificate policies it
supports, its Certification Practice Statement, Information Technology Security Policy and
any specific statutes, policies or contracts relevant to their position.
46
6. TECHNICAL SECURITY CONTROLS
47
6.1.7 Hardware/Software Key Generation
e-Mudhra CA generates key pairs in FIPS 140-1 Level 3 compliant hardware security
modules.
48
6.2.6 Private Key Entry into Cryptographic Module
CA key pairs of e-Mudhra are generated on the hardware cryptographic modules in which
the keys will be used. e-Mudhra ensures a copy of such key pairs for disaster recovery
purposes. All such copies are transferred in an encrypted form.
In case of RA and subscriber, private keys are activated by the client application either by a
PIN or password.
e-Mudhra, shall endeavour to destroy the CA private keys in a manner which ensures that
the destroyed key cannot be reconstructed.
49
6.3.2. Usage Periods for the Public and Private Keys
The expiry date of e-Mudhra CA certificate will be as provided by CCA. e-Mudhra may
consider stopping issuance of new certificates at a suitable date prior to the expiration of its
certificate under e-Mudhra hierarchy so that no certificate issued by a sub CA in the
hierarchy expires after the expiration of the corresponding parent CA certificate.
Certificate Validity
All certificates issued including RA, One year or 2 years based on the
Subscriber requirement of applicant.
50
systems, during installation and thereafter periodically. Such periodicity will be defined by e-
Mudhra as required.
51
7. CERTIFICATE AND CRL PROFILE
Version Version 3
Integer value, unique for each certificate issued by the
Serial number
issuer
Signature Algorithm Algorithm used by the issuer to sign the certificate
The X.500 distinguished name of the entity signing
Issuer DN
the certificate
52
7.1.2 Certificate Extensions
e-Mudhra populates X.509 version 3 Certificates with the extensions listed in table below
53
7.2 CRL Profile
Version Version 2
Signature Algorithm Algorithm used by the issuer to sign the CRL
54
8. SPECIFICATION ADMINISTRATION
e-Mudhra also makes the CPS available upon request sent to:
info@e-mudhra.com
55
The paper copy of the CPS is available from e-Mudhra upon requests sent to:
e-Mudhra,
eMudhra Consumer Services Ltd.,
3rd Floor, Sai Arcade,
Outer Ring Road,
Devarabeesanahalli,
Bangalore - 560036
Karnataka, India
Phone: +91 80 43360000
Email: info@e-mudhra.com
Website: www.e-Mudhra.com
56
9. GLOSSARY
9.1 Definitions
ACCESS
Gaining entry into, instructing or communicating with the logical, arithmetical, or memory
function resources of a computer, computer system or computer network;
ACCESS CONTROL
The process of limiting access to the resources of a computer system only to authorized
users, programs or other computer systems.
ARCHIVE
To store records and associated journals for a given period of time for security, backup, or
auditing purposes.
AUDIT
A procedure used to validate that controls are in place and adequate for their purposes.
Includes recording and analyzing activities to detect intrusions or abuses into an information
system. Inadequacies found by an audit are reported to appropriate management personnel.
AUDIT TRAIL
A chronological record of system activities providing documentary evidence of processing
that enables management staff to reconstruct, review, and examine the sequence of states
and activities surrounding or leading to each event in the path of a transaction from its
inception to output of final results. Confirm
AUTHENTICATION
A process used to confirm the identity of a person or to prove the integrity of specific
information. Message authentication involves determining its source and verifying that it has
not been modified or replaced in transit. (See also VERIFY (a DIGITAL SIGNATURE))
AUTHORIZATION
The granting of rights, including the ability to access specific information or resources.
57
AVAILABILITY
The extent to which information or processes are reasonably accessible and usable, upon
demand, by an authorized entity, allowing authorized access to resources and timely
performance of time-critical operations.
BACKUP
The process of copying critical information, data and software for the purpose of recovering
essential processing back to the time the backup was taken.
CERTIFICATE
A Digital signature certificate issued by Certifying Authority.
CERTIFICATE CHAIN
An ordered list of Certificates containing an end-user Subscriber Certificate and Certifying
Authority Certificates (See VALID CERTIFICATE).
CERTIFICATE EXPIRATION
The time and date specified in the Digital signature certificate when the operational period
ends, without regard to any earlier suspension or revocation.
CERTIFICATE EXTENSION
An extension field to a Digital signature certificate which may convey additional information
about the public key being certified, the certified Subscriber, the Digital signature certificate
issuer, and/or the certification process. Standard extensions are defined in Amendment 1 to
ISO/IEC 9594-8:1995 (X.509). Custom extensions can also be defined by communities of
interest. Render
CERTIFICATE ISSUANCE
The actions performed by a Certifying Authority in creating a Digital Signature
Certificate and notifying the Digital signature certificate applicant (anticipated to become a
Subscriber) listed in the Digital signature certificate of its contents.
CERTIFICATE POLICY
A specialized form of administrative policy tuned to electronic transactions performed during
Digital signature certificate management. A Certificate Policy addresses all aspects
associated with the generation, production, distribution, accounting, compromise recovery
and administration of Digital signature certificates. Indirectly, a Certificate policy can also
govern the transactions conducted using a communications system protected by a
58
Certificate based security system. By controlling critical Certificate extensions, such policies
and associated enforcement technology can support provision of the security services
required by particular applications.
CERTIFICATION / CERTIFY
The process of issuing a Digital signature certificate by a Certifying Authority.
CERTIFICATE CLASS
A Digital signature certificate of a specified level of trust.
CLIENT APPLICATION
An application that runs on an electronic device and relies on a server to perform some
operation.
COMMON KEY
Some systems of cryptographic hardware require arming through a secret-sharing process
and require that the last of these shares remain physically attached to the hardware in order
for it to stay armed. In this case, “common key” refers to this last share. It is not assumed to
be secret as it is not continually in an individual’s possession.
59
COMMUNICATION/NETWORK SYSTEM
A set of related, remotely connected devices and communications facilities including more
than one computer system with the capability to transmit data among them through the
communications facilities (covering ISDN, lease lines, dial-up, LAN, WAN, etc.).
COMPROMISE
A violation (or suspected violation) of a security policy, in which an unauthorized disclosure
of, or loss of control over, sensitive information may have occurred. (Cf., DATA INTEGRITY)
COMPUTER
Any electronic, magnetic, optical or other high-speed data processing device or system
which performs logical, arithmetic, and memory functions by manipulations of electronic,
magnetic or optical impulses, and includes all input, output, processing, storage, computer
software, or communication facilities which are connected or related to the computer in a
computer system or computer network.
CONFIDENTIALITY
The condition in which sensitive data is kept secret and disclosed only to authorized parties.
CONFIRM
To ascertain through appropriate inquiry and investigation. (See also AUTHENTICATION;
VERIFY A DIGITAL SIGNATURE)
CONTINGENCY PLANS
The establishment of emergency response, back up operation, and post-disaster recovery
processes maintained by an information processing facility or for an information system.
Establish the strategy for recovering from unplanned disruption of information processing
operations. The strategy includes the identification and priority of what must be done, who
performs the required action, and what tools must be used.
A document developed in conjunction with application owners and maintained at the primary
and backup computer installation, which describes procedures and identifies the personnel
necessary to respond to abnormal situations such as disasters. Contingency plans help
managers ensure that computer application owners continue to process (with or without
computers) mission-critical applications in the event that computer support is interrupted.
CONTROLS
Measures taken to ensure the integrity and quality of a process.
CORRESPOND
To belong to the same key pair. (See also PUBLIC KEY; PRIVATE KEY)
CRITICAL INFORMATION
Data determined by the data owner as mission critical or essential to business purposes.
CROSS-CERTIFICATE
A Certificate used to establish a trust relationship between two Certifying Authorities.
60
CRYPTOGRAPHY (See also PUBLIC KEY CRYPTOGRAPHY)
The mathematical science used to secure the confidentiality and authentication of data by
replacing it with a transformed version that can be reconverted to reveal the original data
only by someone holding the proper cryptographic algorithm and key.
A discipline that embodies the principles, means, and methods for transforming data in order
to hide its information content, prevent its undetected modification, and/or prevent its
unauthorized uses.
DAMAGE
Means to destroy, alter, delete, add, modify or rearrange any digital resource by any means.
DATA
Means a representation of information, knowledge, facts, concepts or instructions which are
being prepared or have been prepared in a formalized manner, and is intended to be
processed, is being processed or has been processed in a digital system or electronic
network, and may be in any form (including printouts magnetic or optical storage media,
punched cards, punched tapes) or stored internally in the memory of an electronic device.
DIGITAL SIGNATURE
Means authentication of any electronic record by a Subscriber by means of an electronic
method or procedure in accordance with the provisions of section 3 of the Information
Technology Act, 2000.
DISTINGUISHED NAME
A set of data that identifies a real-world entity, such as a person in a digital context.
DOCUMENT
A record consisting of information inscribed on a tangible medium such as paper rather than
digital -based information. (See also MESSAGE; RECORD)
61
ELECTRONIC FORM
With reference to information means any information generated, sent, received or stored in
media, magnetic, optical, device memory, microfilm, electronic device generated microfiche
or similar device.
ELECTRONIC DEVICE
A device depending on the principles of electronics and using the manipulation of electron flow for its
operation. It includes computers, mobiles or any other form of electronic devices.
ELECTRONIC RECORD
Means data, record or data generated, image or sound stored, received or sent in an
electronic form or microfilm or electronic devices generated microfiche.
ENCRYPTION
The process of transforming plaintext data into an unintelligible form (cipher text) such that
the original data either cannot be recovered (one-way encryption) or cannot be recovered
without using an inverse decryption process (two-way encryption).
EXTENSIONS
Extension fields in X.509 v3 Certificates. (See X.509)
FIREWALL/DOUBLE FIREWALL
One of several types of intelligent devices (such as routers or gateways) used to isolate
networks. Firewalls make it difficult for attackers to jump from network to network. A double
firewall is two firewalls connected together. Double firewalls are used to minimize risk if one
firewall gets compromised or provide address translation functions.
FUNCTION
In relation to a an electronic device, includes logic, control, arithmetical process, deletion,
storage and retrieval and communication or telecommunication from or within an electronic
device..
62
It is computationally infeasible to find two different messages that produce the same hash
result using the same algorithm.
IDENTIFICATION / IDENTIFY
The process of confirming the identity of a person. Identification is facilitated in public key
cryptography by means of Certificates.
IDENTITY
A unique piece of information that marks or signifies a particular entity within a domain. Such
information is only unique within a particular domain.
INFORMATION
Includes data, text, images, sound, voice, codes, programmes, software and databases or
microfilm or electronic device generated microfiche.
KEY
A sequence of symbols that controls the operation of a cryptographic transformation
(E.g. encipherment, decipherment, cryptographic checks function computation, Signature
generation, or Signature verification).
KEY GENERATION
The trustworthy process of creating a private key/public key pair.
KEY MANAGEMENT
The administration and use of the generation, registration, certification, deregistration,
distribution, installation, storage, archiving, revocation, derivation and destruction of keying
material in accordance with a security policy.
KEY PAIR
In an asymmetric crypto system, means a private key and its mathematically related public
key, which are so related that the public key can verify a Digital Signature created by the
private key.
LICENCE
Means a licence granted to a Certifying Authority.
63
LOCAL AREA NETWORK (LAN)
A geographically small network of computers and supporting components used by a group
or department to share related software and hardware resources.
MEDIA
The material or configuration on which data is recorded. Examples include magnetic taps
and disks.
MESSAGE
A Digital representation of information; an electronic device based record. A subset of
RECORD. (See also RECORD)
NAME
A set of identifying attributes purported to describe an entity of a certain type.
NETWORK
A set of related, remotely connected devices and communications facilities including more
than one electronic device system with the capability to transmit data among them through
the communications facilities.
NONREPUDIATION
Provides proof of the origin or delivery of data in order to protect the sender against a false
denial by the recipient that the data has been received or to protect the recipient against
false denial by the sender that the data has been sent. Note: Only a trier of fact (someone
with the authority to resolve disputes) can make an ultimate determination of non-
repudiation. By way of illustration, a Digital Signature verified pursuant to this Certification
Practice Statement can provide proof in support of a determination of non-repudiation by a
trier of fact, but does not by itself constitute non-repudiation.
ON-LINE
Communications that provide a real-time connection.
OPERATIONS ZONE
An area where access is limited to personnel who work there and to properly escorted
visitors. Operations Zones should be monitored at least periodically, based on a threat risk
assessment (TRA), and should preferably be accessible from a Reception Zone.
OPERATIONAL PERIOD
The period starting with the date and time a Digital signature certificate is issued (or on a
later date and time certain if stated in the Digital signature certificate) and ending with the
date and time on which the Digital signature certificate expires or is earlier suspended or
revoked.
ORGANISATION
An entity with which a user is affiliated. An organization may also be a user.
64
PASSWORD (PASS PHRASE; PIN NUMBER)
Confidential authentication information usually composed of a string of characters used to
provide access to an electronic device.
PERSON
Means any company or association or individual or body of individuals, whether incorporated
or not.
PERSONAL PRESENCE
The act of appearing (physically rather than virtually or figuratively) before a Certifying
Authority or its designee and proving one's identity as a prerequisite to Digital signature
certificate issuance under certain circumstances.
PKI HIERARCHY
A set of Certifying Authorities whose functions are organized according to the principle of
delegation of authority and related to each other as subordinate and superior Certifying
Authority.
POLICY
A brief document that states the high-level organization position, states the scope, and
establishes who is responsible for compliance with the policy and the corresponding
standards. Following is an abbreviated example of what a policy may contain:
• Introduction
• Definitions
• Policy Statement identifying the need for “something” (e.g. data security)
• Scope
• People playing a role and their responsibilities
• Statement of Enforcement, including responsibility
PRIVATE KEY
The key of a key pair used to create a Digital Signature.
PROCEDURE
A set of steps performed to ensure that a guideline is met.
PUBLIC KEY
65
The key of a key pair used to verify a Digital Signature and listed in the Digital signature
certificate.
PUBLIC/PRIVATE KEY PAIR (See PUBLIC KEY; PRIVATE KEY; KEY PAIR)
RECORD
Information that is inscribed on a tangible medium (a document) or stored in an electronic or
other medium and retrievable in perceivable form. The term “record” is a superset of the two
terms “document” and “message”. (See also DOCUMENT; MESSAGE)
RELYING PARTY
A recipient who acts in reliance on a Certificate and Digital Signature. (See also RECIPIENT;
RELY OR RELIANCE (on a CERTIFICATE and DIGITAL SIGNATURE))
RENEWAL
The process of obtaining a new Digital signature certificate of the same class and type for
the same subject once an existing Digital signature certificate has expired.
REPOSITORY
A database of Digital signature certificates and other relevant information accessible on-line.
66
REPUDIATION (See also NONREPUDIATION)
The denial or attempted denial by an entity involved in a communication of having
participated in all or part of the communication.
REVOKE A CERTIFICATE
The process of permanently ending the operational period of a Digital signature certificate
from a specified time forward.
RISK
The potential of damage to a system or associated assets that exists as a result of the
combination of security threat and vulnerability.
SECRET SHARE
A portion of a cryptographic secret split among a number of physical tokens.
SECURITY PROCEDURE
Means the security procedure prescribed under section 16 of the Information Technology
Act, 2000.
SECURITY
The quality or state of being protected from unauthorized access or uncontrolled losses or
effects. Absolute security is impossible to achieve in practice and the quality of a given
security system is relative. Within a state-model security system, security is a specific "state"
to be preserved under various operations.
SECURITY POLICY
A document which articulates requirements and good practices regarding the protections
maintained by a trustworthy system.
SERVER
A computer system that responds to requests from client systems.
SMART CARD
A hardware token that incorporates one or more integrated circuit (IC) chips to implement
cryptographic functions and that possesses some inherent resistance to tampering.
S/MIME
A specification for E-mail security exploiting cryptographic message syntax in an Internet
MIME environment.
67
SUBJECT NAME
The unambiguous value in the subject name field of a Digital signature certificate, which is
bound to the public key.
SUBSCRIBER
A person in whose name the Digital signature certificate is issued.
SUBSCRIBER AGREEMENT
The agreement executed between a Subscriber and a Certifying Authority for the provision
of designated public certification services in accordance with this Certification Practice
Statement.
SUBSCRIBER INFORMATION
Information supplied to a certification authority as part of a Digital signature certificate
application. (See also CERTIFICATE APPLICATION)
SYSTEM ADMINISTRATOR
The person at a computer installation who designs, controls, and manages the use of the
computer system.
THREAT
A circumstance or event with the potential to cause harm to a system, including the
destruction, unauthorized disclosure, or modification of data and/or denial of service.
TOKEN
A hardware security token containing a user’s private key(s), public key Certificate, and,
optionally, a cache of other Certificates, including all Certificates in the user’s certification
chain.
TRANSACTION
A electronic device based transfer of business information, which consists of specific
processes to facilitate communication over global networks.
TRUST
Generally, the assumption that an entity will behave substantially as expected. Trust may
apply only for a specific function. The key role of this term in an authentication framework is
to describe the relationship between an authenticating entity and a Certifying Authority. An
authenticating entity must be certain that it can trust the Certifying Authority to create only
valid and reliable Digital signature certificates, and users of those Digital signature
certificates rely upon the authenticating entity’s determination of trust.
TRUSTED POSITION
A role that includes access to or control over cryptographic operations that may materially
affect the issuance, use, suspension, or revocation of Digital signature certificates, including
operations that restrict access to a repository.
68
TRUSTWORTHY SYSTEM
Electronic device , software, and procedures that are reasonably secure from intrusion and
misuse; provide a reasonable level of availability, reliability, and correct operation; are
reasonably suited to performing their intended functions; and enforce the applicable security
policy. A trustworthy system is not necessarily a “trusted system” as recognized in classified
government nomenclature.
USER
An authorized entity that uses a Certificate as applicant, Subscriber, recipient or relying
party, but not including the Certifying Authority issuing the Digital signature certificate. (See
also CERTIFICATE APPLICANT; ENTITY; PERSON; SUBSCRIBER)
VULNERABILITY
A weakness that could be exploited to cause damage to the system or the assets it contains.
WEB BROWSER
A software application used to locate and display web pages.
X.509
The ITU-T (International Telecommunications Union-T) standard for Digital signature
certificates. X.509 v3 refers to Certificates containing or capable of containing extensions.
69